1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
erma4kov [3.2K]
3 years ago
10

List six features of the Microsoft ​

Computers and Technology
1 answer:
Pie3 years ago
7 0

Answer:

Different things of Microsoft word (I believe that is what you meant?)

1. Spelling and Grammar Check / dialog box

2. Mailing Merge

3. Find and Replace

4. Inserting Watermarks

5. Inserting header and footer

6. hyperlinks

If you meant windows heres a list of some of the things they have.

1. Start Menu

2. Cortana on Desktop

3. Xbox App

4. Project Spartan Browser

5. Improved Multitasking

6. Universal Apps

7. Office Apps Get Touch Support

8. Continuum

9. Action Center

10. Unified Settings / Control Panel

Let me know if you needed something different

You might be interested in
An intruder with malicious intent breaks into an office and steals a hard drive
Leya [2.2K]

Based on the above, the type of security is illustrated in this example is known as data security.

<h3>What is Data security?</h3>

This is known to be the act of keeping safe data from unauthorized access and its corruption in all of its lifecycle.

Note that in the case above, the intruder is interested in the companies data and as such,  the type of security is illustrated in this example is known as data security.

Learn more about  security from

brainly.com/question/15668437

#SPJ1

6 0
2 years ago
An i/o system call returns a one-bit information about the status of the call.
amid [387]

An i/o system call returns one-bit information about the call's status, Therefore the given statement is true.

<h3>What is an i/o system?</h3>
  • I/O (Input/Output) is a type of data processing system that sends and receives data from a computer hardware component, device, or network. A network allows data to be sent between devices. Computers would be unable to communicate with other systems or devices if I/O was not present.
  • The primary function of an i/o system is processor communication, which includes a variety of tasks such as data transfer between the processor and an I/O module, accepting and decoding commands sent by the processor, reporting current status, and the ability for the I/O module to recognize its own unique address.
  • A system call allows a user program to communicate with the operating system. The program requests a number of services, and the operating system responds by invoking a series of system calls to fulfill the request.

To learn more about i/o system call  refer to :

brainly.com/question/1763761

#SPJ4

6 0
1 year ago
A _____ is inserted so that a portion of a document that can have different formatting from the rest of the document. a. heading
Nookie1986 [14]
A page break is inserted so that a portion of a document that can have different formatting from the rest of the document. 
4 0
3 years ago
In your Pest Busters game, how does Player 2 move the Ship 2 object?
Nuetrik [128]

Answer:

The answer is A.

Explanation:

7 0
3 years ago
LITERALLY PLS ANYONE!!! 90 pointsss!
Doss [256]

7. Intentional Virus Setting is when you the user purposely spread computer viruses in order to do harm. It should be noted that this is highly illegal (no duh) with a sentence of up to 10 years and $250,000 in penalties assuming you are convicted under the Computer Fraud and Abuse Act of 1986 here in the States.

8. intrusion of solitude, appropriation of name or likeness, public disclosure of private facts, and false light.

9.  Intentionally creating and/or sending a virus and infecting people's computers is against the law, and can result in jail time or a fine.

10. Some examples are: Deception - Lying about how information will be used. Violation of confidentiality - Disclosing someone's personal information without consent. Intrusion - Interference in an employee's personal life. Misappropriation - Using a person's likeness to promote a product without his consent.

11. Everyone wants PRIVACY for themselves, and everyone wants ACCOUNTABILITY from others. Privacy is a basic human need, and invasion of privacy can have serious psychological and emotional consequences, including paranoia, anxiety, depression and broken trust. Invasion of privacy is both a legal and an ethical issue.

12. A cause of action for invasion of privacy entitles the plaintiff to recover damages for the harm to the particular element of his or her privacy that is invaded. Thus, one who suffers an intrusion upon his or her solitude or seclusion, may recover damages for the deprivation of his or her seclusion.

13. An acceptable use policy (AUP) is a document stipulating constraints and practices that a user must agree to for access to a corporate network or the Internet. Many businesses and educational facilities require that employees or students sign an acceptable use policy before being granted a network ID.

14. Intellectual property refers to creations of the mind: inventions; literary and artistic works; and symbols, names and images used in commerce. Intellectual property is divided into two categories: Industrial Property includes patents for inventions, trademarks, industrial designs and geographical indications.

PLEASE PLEASE PLEASE HELP WITH MY RECENT!!!!!!

btw hope this helps if it does please make brainliest :)

6 0
3 years ago
Read 2 more answers
Other questions:
  • If you wish to maintain a consistent style to all the documents you create, it would be helpful to use a _____.
    10·1 answer
  • Will somebody please explain to me HTML?
    8·1 answer
  • Identify the following as True or False.
    14·1 answer
  • What do you think about the future of computers?​
    14·1 answer
  • A store trying to analyze the behavior of its customers will often maintaina two-dimensional array A, where the rows correspond
    6·1 answer
  • To print the last element in the array named ar, you can write :A. System.out.println(ar.length);
    13·1 answer
  • A popular photo editing application provides customers with the option of accessing a web based version through a monthly subscr
    11·1 answer
  • I need advice, please try to give a full paragraph and include a p r o s and c o n s list, no l i n k s please, it would mean so
    8·1 answer
  • Need help asap please
    15·1 answer
  • Language modeling incorporates rules of __. Select all that apply.
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!